A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

[HTML][HTML] Misconfiguration in O-RAN: Analysis of the impact of AI/ML

NM Yungaicela-Naula, V Sharma, S Scott-Hayward - Computer Networks, 2024 - Elsevier
User demand on network communication infrastructure has never been greater with
applications such as extended reality, holographic telepresence, and wireless brain …

Kunerva: Automated network policy discovery framework for containers

S Lee, J Nam - IEEE Access, 2023 - ieeexplore.ieee.org
Containerization has gained significant popularity in cloud-native applications, offering
lightweight and portable capabilities, with container orchestration platforms such as …

Container Security in Cloud Environments: A Comprehensive Analysis and Future Directions for DevSecOps

S Ugale, A Potgantwar - Engineering Proceedings, 2023 - mdpi.com
In recent years, the security of containers has become a crucial aspect of modern software
applications' security and integrity. Containers are extensively used due to their lightweight …

CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters

M GholipourChoubeh, H Kermabon-Bobinnec… - Proceedings of the …, 2024 - dl.acm.org
With the emergence of 5G networks and their large scale applications such as IoT and
autonomous vehicles, telecom operators are increasingly offloading the computation closer …

PerfSPEC: Performance Profiling-based Proactive Security Policy Enforcement for Containers

H Kermabon-Bobinnec, S Bagheri… - … on Dependable and …, 2024 - ieeexplore.ieee.org
Container environments provide cloud native applications with scalability, flexibility, and
portable support. As a popular container orchestrator, Kubernetes facilitates automatic …

Warping the Defence Timeline: Non-disruptive Proactive Attack Mitigation for Kubernetes Clusters

S Bagheri, H Kermabon-Bobinnec… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
In spite of being the de-facto standard of container orchestrators, Kubernetes reportedly
suffers from security vulnerabilities and misconfigurations which may lead to severe security …

A Multi-pronged Self-adaptive Controller for Analyzing Misconfigurations for Kubernetes Clusters and IoT Edge Devices

A Samir, A Al-Wosabi, M Khan… - European Conference on …, 2023 - Springer
Kubernetes default configurations do not always provide optimal security and performance
for all clusters and IoT edge devices deployed, making them vulnerable to security breaches …

Procesos de protección en entornos de ejecución de contenedores Kubernetes para una entidad financiera: una revisión sistemótica

CST Valladares, ASQ Sacoto - Dominio de las Ciencias, 2022 - dominiodelasciencias.com
Procesos de protección en entornos de ejecución de contenedores Kubernetes para una
entidad financiera: una revisión sistemá Page 1 DOI: http://dx.doi.org/10.23857/dc.v8i3 Dom …

A Cost-effective Framework to Proactive and Non-disruptive Attack Mitigation in Kubernetes Clusters

S Bagheri - 2023 - spectrum.library.concordia.ca
A large-scale cluster of containers managed with an orchestrator like Kubernetes is behind
many cloud-native applications today. However, the weaker isolation provided by containers …